Last updated:

6th July 2023

Covering your tracks

Leave this page

If your abuser is tracking your movements or likely to be checking your phone or internet history, try to use a friend’s phone to make arrangements to leave, or buy a cheap pre-paid phone (“burner phone”); delete your website searches and search history, and be aware of geo-location settings on your phone. 

The tech abuse page on the Refuge website has lots of helpful information to inform you about potential ways in which technology may be used to monitor your movements and has lots of useful resources.

Technological risks

For someone experiencing domestic abuse, it can feel like every aspect of your world is controlled and the online world is no different. Devices such as smartphones and tablets can be misused to stalk, harass, impersonate, and threaten including being used to carry out financial abuse through banking websites and apps. 

It can be useful to think about your whole digital footprint - looking at all areas that you use tech in your life and consider if there are any areas where you would like to improve your understanding, update your security or restrict your visibility. As some abusers may notice if you try to make changes to passwords, or your settings, it may be useful to talk through your tech safety with the domestic abuse support service, or look at more detailed information on the Refuge Tech Safety website

Some tips include:

  • Change user names and passwords (if safe to do so), even if you don't think the accounts have been compromised, to strong passwords which your abuser will not be able to guess
  • Update security settings on social media so that only the people you want to connect with can see your posts, photos and information
  • Be aware of location settings. Lots of apps and software record information about your geographical location and consider turning off tracking apps when not in use like GPS fitness trackers, sat nav (please be aware of any increased risks as a result of doing this, for example, the abuser then turning up in person)
  • Consider any connected or joint accounts that may have been installed on more than one device and could give someone access to your information, or devices like iTunes, app stores, Google Play store, eBay, Amazon, Kindle and others
  • Think about tech in the home. Are there any smart devices like Amazon Echo (Alexa), Google Home, a smart thermostat, house alarm system that can be accessed remotely
  • Secure your home WiFi network as a person may be able to access your devices via the WiFi network, which will be accessible without being in your home. Change the login details if possible
  • Be aware that camera's and devices can be accessed remotely or activated by apps, so consider covering the webcam on your computer / tablet when not in use

Give website feedback